Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Figure 11

Sensitivity analysis. (a) Decrypted image by correct key. (b) Decrypted image by . (c) Decrypted image by . (d) Decrypted image by . (e) Decrypted image by . (f) Decrypted image by .
(a)
(b)
(c)
(d)
(e)
(f)